


default search action
The International Arab Journal of Information Technology, Volume 15
Volume 15, Number 1, January 2018
- Anuradha Yarlagadda, Murthy V. Jonnalagedda, Krishna Munaga:

Clustering based on correlation fractal dimension over an evolving data stream. 1-9 - Ehsan Arianyan, Hassan Taheri, Saeed Sharifian, Mohsen Tarighi:

New six-phase on-line resource management process for energy and sla efficient consolidation in cloud data centers. 10-20 - Muhammad Hassan, Muhammad Shoaib:

Opinion within opinion: segmentation approach for urdu sentiment analysis. 21-28 - Süleyman Eken, Abdülkadir Karabas, Hayrunnisa Sari, Ahmet Sayar:

A framework for recognition and animation of chess moves printed on a chess book. 29-36 - Pulung Andono, Catur Supriyanto:

Bag-of-visual-words model for fingerprint classification. 37-43 - Anjali Goel, Rajesh Prasad, Suneeta Agarwal, Amit Sangal:

Efficient parameterized matching using burrows-wheeler transform. 44-49 - Jovana Bozic, Djordje Babic:

Financial time series forecasting using hybrid wavelet-neural model. 50-57 - Mohamed Hassine, Lotfi Boussaid, Hassani Massaoud:

Tunisian dialect recognition based on hybrid techniques. 58-65 - Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi:

Missing values estimation for skylines in incomplete database. 66-75 - Omar A. Alzubi, Jafar Ahmad Abed Alzubi, Sara Tedmori, Hasan Rashaideh, Omar Almomani:

Consensus-based combining method for classifier ensembles. 76-86 - Nasour Bagheri, Seyed Farhad Aghili, Masoumeh Safkhani:

On the security of two ownership transfer protocols and their improvements. 87-93 - Praynlin Edinson, Latha Muthuraj:

Performance analysis of FCM based ANFIS and ELMAN neural network in software effort estimation. 94-102 - Vijayalakshmi Murugesan, Mercy Shalinie Selvaraj:

UDP based IP traceback for flooding DDoS attack. 103-111 - Guruvayur Mahalakshmi, Vani Vijayan, Betina Antony:

Named entity recognition for automated test case generation. 112-120 - Abdul Kadar Muhammad Masum, Loo-See Beh, Md. Abul Kalam Azad, Kazi Hoque:

Intelligent human resource information system (i-HRIS): a holistic decision support framework for HR excellence. 121-130 - Houcine Boubaker, Aymen Chaabouni, Haikal El Abed, Adel M. Alimi:

GLoBD: geometric and learned logic algorithm for straight or curved handwriting baseline detection. 131-140 - Muhammad Sohail Khan, DoHyeun Kim:

Service process modelling and performance analysis for composite context provisioning in IoT. 141-147 - Kishorebabu Vasanth, Karuppaiyan Kumar, Nagarajan Govindan, Ravi Natarajan, Godwin Immanual:

Decision based detail preserving algorithm for the removal of equal and unequal probability salt and pepper noise in images and videos. 148-156 - Kavitha JeyaKumar, Manjula Dhanabalachandran, Kasthuri JeyaKumar:

Effective and efficient utility mining technique for incremental dataset. 157-166 - Suma Shivaraju, Gopalan Pudur:

Splay thread cooperation on ray tracing as a load balancing technique in speculative parallelism and GPGPU. 167-176
Volume 15, Number 2, March 2018
- Fidan Kaya Gülagiz, Süleyman Eken, Adnan Kavak, Ahmet Sayar:

Idle time estimation for bandwidth-efficient synchronization in replicated distributed file system. 177-185 - Kresimir Nenadic, Tomislav Galba, Irena Galic:

Image processing in differential digital holography (DDH). 186-193 - Sujatha Paramasivam, Radhakrishnan Murugesanadar:

An optimized model for visual speech recognition using HMM. 194-201 - Naveen Dahiya, Vishal Bhatnagar, Manjeet Singh:

A fuzzy based matrix methodology for evaluation and ranking of data warehouse conceptual models metrics. 202-212 - Rajarajan Srinivasan:

DragPIN: A secured PIN entry scheme to avert attacks. 213-223 - Shah Nazir, Sara Shahzad, Saeed Mahfooz, Muhammad Nazir:

Fuzzy logic based decision support system for component security evaluation. 224-231 - Sameer Qazi, Muhammad Bilal Kadri:

Revisiting constraint based geo location: improving accuracy through removal of outliers. 232-239 - Thinakaran Kandasamy, Rajasekar Rajendran:

Hybrid algorithm with variants for feed forward neural network. 240-245 - Kavitha Karthiekheyan, Irfan Ahmed, Jalaja Jayalakshmi:

Pair programming for software engineering education: an empirical study. 246-255 - Kazim Yildiz, A. Yilmaz Çamurcu, Buket Dogan:

Comparison of dimension reduction techniques on high dimensional datasets. 256-262 - Avisek Gupta, Kamal Sarkar:

Recognition of spoken bengali numerals using MLP, SVM, RF based models with PCA based feature summarization. 263-269 - Hassan Mohamed, Abdel-Azim Negm, Mohamed Zahran, Oliver Saavedra:

Assessment of ensemble classifiers using the bagging technique for improved land cover classification of multispectral satellite images. 270-277 - Md. Sazzad Hossain, Mohammad Abu Yousuf:

Real time facial expression recognition for nonverbal communication. 278-288 - Praneet Saurabh, Bhupendra Verma:

Immunity inspired cooperative agent based security system. 289-295 - Maragatha Valli, Kanmani Selvadurai:

Incorporating unsupervised machine learning technique on genetic algorithm for test case optimization. 296-302 - Sasikumar Kandasamy, Sivanandam Natarajan, Ayyasamy Sellappan:

A signaling system for quality of service (QoS)-aware content distribution in peer-to-peer overlay networks. 303-312 - Muthulakshmi Angamuthu, Akshaya Mani, Anitha Ramalingam:

Cipher text policy attribute based broadcast encryption for multi-privileged groups. 313-320 - Young-Chang Hou, Zen-Yu Quan, Chih-Fong Tsai:

Progressive visual cryptography with friendly and size invariant shares. 321-330 - Tran Khanh Dang, Van Quoc Phuong Huynh, Hai Truong:

A hybrid template protection approach using secure sketch and ANN for strong biometric key generation with revocability guarantee. 331-340 - Ayoub Kadim, Azzeddine Lazrek:

Parallel HMM-based approach for arabic part of speech tagging. 341-351
Volume 15, Number 3, May 2018
- Gomathi Ramalingam, Sharmila Dhandapani:

A hybrid batcs algorithm to generate optimal query plan. 353-359 - Abdul Khader Jilani Saudagar, Habeeb Vulla Mohammed:

Arabic character extraction and recognition using traversing approach. 360-368 - El-Sayed M. El-Alfy, Zubair A. Baig, Radwan E. Abdel-Aal:

A novel approach for face recognition using fused GMDH-based networks. 369-377 - Orasa Patsadu, Bunthit Watanapa, Piyapat Dajpratham, Chakarida Nukoolkit:

Fall motion detection with fall severity level estimation by mining kinect 3D data stream. 378-388 - Mahmoud Elmezain, Ayoub Al-Hamadi:

Vision-based human activity recognition using. 389-395 - Jun Hu, Li Zou, Ru Xu:

Bilateral multi-issue negotiation model for a kind of complex environment. 396-404 - Ahmad Karamollahi, Abdolah Chalechale, Mahmood Ahmadi:

Energy consumption improvement and cost saving by cloud broker in cloud datacenters. 405-411 - Pradeep Sahoo, Rajagopalan Parthasarthy:

An efficient web search engine for noisy free information retrieval. 412-418 - Hamdi Hassen, Aisha Zaidan, Maher Khemakhem:

Complementary approaches built as web service for arabic handwriting OCR systems via amazon elastic mapreduce (EMR) model. 419-428 - Adeel-ur-Rehman, Naveed Riaz:

Advanced architecture for java universal message passing (AA-JUMP). 429-434 - Salini Prabhakaran, Kanmani Selvadurai:

Performance analysis of security requirements engineering framework by measuring the vulnerabilities. 435-444 - Poongothai Marimuthu, Rajeswari Arumugam, Jabar Ali:

Hybrid metaheuristic algorithm for real time task assignment problem in heterogeneous multiprocessors. 445-453 - Sid-Ahmed-Djallal Midouni, Youssef Amghar, Azeddine Chikh:

A multimedia web service matchmaker. 454-461 - Elhachemi Guerrout, Ramdane Mahiou, Samy Ait-Aoudia:

Hidden markov random fields and particle swarm combination for brain image segmentation. 462-468 - Nallasamy Viswanathan, Kuppusamy Paramasivam, Kanagasabapathi Somasundaram:

Vertical links minimized 3D NoC topology and router-arbiter design. 469-478 - Kannan Paulraj, Nithya Natesan:

Effective technology based sports training system using human pose model. 479-484 - Deepak Ganeshiya, Dilip Kumar Sharma:

Hierarchicalrank: webpage rank improvement using HTML taglevel similarity. 485-492 - Ming Xu:

A new chaos-based image encryption algorithm. 493-498 - Ahlem Melouah, Soumia Layachi:

Overview of automatic seed selection methods for biomedical images segmentation. 499-504 - Hatem Abdul-Kader, Rashed K. Salem, Safaa Saleh:

Intelligent replication for distributed active real-time databases systems. 505-513
Volume 15, Number 3A, 2018
- Adnan Shaout, Brennan Crispin:

Using the MQTT protocol in real time for synchronizing IoT device state. 515-521 - Farida Retima, Saber Benharzallah, Laid Kahloul, Okba Kazar:

A quality-aware context information selection based fuzzy logic in IoT environment. 522-531 - Ramzi Zouari, Houcine Boubaker, Monji Kherallah:

RNN-LSTM based beta-elliptic model for online handwriting script identification. 532-539 - Chérifa Ben Khelil, Chiraz Ben Othmane Zribi, Denys Duchier, Yannick Parmentier:

Building a syntactic-semantic interface for asemi-automatically generated TAG for arabic. 540-549 - Firas AlBalas, Majd Al-Soud, Omar Almomani, Ammar Almomani:

Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. 550-558 - Yaser A. Al-Lahham, Khawlah Matarneh, Mohammad Hasan:

Conditional arabic light stemmer: condlight. 559-564 - Ibtissem Hadj Ali, Mohamed Ali Mahjoub:

Dynamic random forest for the recognition of arabic handwritten mathematical symbols with a novel set of features. 565-575 - Duaa Abdelrazaq, Saleh M. Abu-Soud, Arafat Awajan:

A machine learning system for distinguishing nominal and verbal arabic sentences. 576-584 - Mustafa Al-Fayoumi, Salam Hamdan, Malek Al-Zewairi:

A new model of multi-key generation for RFID access control system. 585-591 - Ghassan Samara, Mohammad Aljaidi:

Aware-routing protocol using best first search algorithm in wireless sensor. 592-598 - Thabit Sabbah, Mosab Ayyash, Mahmood Ashraf:

Hybrid support vector machine based feature selection method for text classification. 599-609 - Imane Lahbari, Said Ouatik El Alaoui, Khalid Alaoui Zidani:

Toward a new arabic question answering system. 610-619 - Mahmoud Al-Ayyoub, Nour Alhuda Damer, Ismail Hmeidi:

Using deep learning for automatically determining correct application of basic quranic recitation rules. 620-625 - Issam Jebreen, Ahmad Alqerem:

Critical proficiencies for requirements analysts: reflect a real-world needs. 626-632
Volume 15, Number 4, July 2018
- Revathi Sujendran, Malathi Arunachalam:

Design and development of suginer filter for intrusion detection using real time network data. 633-638 - Priyanka Singh:

A robust blind watermarking scheme for ownership assertion of multi-band satellite images. 639-643 - Sulochana Subramaniam, Vidhya Rangasamy, Vijayasekaran Duraisamy, Mohanraj Karuppanan:

Application of framelet transform and singular value decomposition to image enhancement. 644-649 - Khairul Anwar Bin Kamarul Hatta, Kuokkwee Wee, Wooi Ping Cheah, Yit Yin Wee:

Bayesian information criterion in LTE downlink scheduling algorithm. 650-660 - Belal Abu Ata, Asma Al-Omari:

A rule-based algorithm for the detection of arud meter in classical arabic poetry. 661-667 - Feng Wang, Lei Shi, Weiguo Fan, Cong Wang:

Application of computational geometry in coal mine roadway 3D localization. 668-674 - Huan Doan, Dinh Nguyen:

A method for finding the appropriate number of clusters. 675-682 - Abdenour Mekhmoukh, Karim Mokrani:

Mr brain image segmentation using an improved kernel fuzzy local information c-means based wavelet, particle swarm optimization (PSO) initialization and outlier rejection with level set methods. 683-692 - Sathyashrisharmilha Pushparaj, Sakthivel Arumugam:

Using 3D convolutional neural network in surveillance videos for recognizing human actions. 693-700 - Khalid Nahar:

Off-line arabic hand-writingrecognition using artificial neural networkwith genetics algorithm. 701-707 - Lilibeth Coronel, Wilfredo Badoy, Consorcio Namoco:

Identification of an efficient filtering-segmentation technique for automated counting of fish fingerlings. 708-714 - Fouad Aouinti, M'barek Nasri, Mimoun Moussaoui, Bouchta Bouali:

An improved richardson-lucy algorithm based on genetic approach for satellite image restoration. 715-720 - Hasmukh Patel, Devesh Jinwala:

STF-DM: a sparsely tagged fragmentation with dynamic marking an IP traceback approach. 721-728 - Selvam Sheba, Ramadoss Balakrishnan, S. R. Balasundaram:

Social event detection - a systematic approach using ontology and linked open data with significance to semantic links. 729-738 - Kshiramani Naik, Arup Kumar Pal, Rohit Agrawal:

Selective image encryption using singular value decomposition and arnold transform. 739-747 - I Jasmine Selvakumari Jeya, J. Suganthi:

Using visible and invisible watermarking algorithms for indexing medical images. 748-755 - Imen Trabelsi, Dorra Ben Ayed, Noureddine Ellouze:

Evaluation of influence of arousal-valence primitives on speech emotion recognition. 756-762 - Rajeev Kumar, Satish Chand, Samayveer Singh:

A reversible data hiding scheme using pixel location. 763-768 - Ramesh Muthiya, Gomathy Balasubramanian, Sundararajan Paramasivam:

Pseudorandom noise sequence of digital watermarking algorithm based on discrete wavelet transform using medical image. 769-776 - Asima Latif, Shah Khusro, Nasir Ahmad, Irfan Ullah:

A hybrid technique for annotating book tables. 777-783
Volume 15, Number 5, September 2018
- Izzat Alsmadi, Mohammad Zarour:

Google n-gram viewer does not include arabic corpus! towards n-gram viewer for arabic corpus. 785-794 - Mohammed Abd-Elnaby, Mohamad Elhadad, El-Sayed El-Rabaie:

Capacity enhancement based on dynamically adapted PF scheduling algorithm for LTE downlink system. 795-801 - Shajeena Johnson:

Temporal tracking on videos with direction detection. 802-808 - Mohamed Y. Benzian, Nacéra Benamrane:

Medical image segmentation based on fuzzy controlled level set and local statistical constraints. 809-816 - Vamsee Muppavarapu, Archanaa Rajendran, Shriram K. Vasudevan:

Phishing detection using RDF and random forests. 817-824 - Nada Habeeb, Saad Hasson, Phil D. Picton:

Multi-sensor fusion based on DWT, fuzzy histogram equalization for video sequence. 825-830 - Bharat Singh, Om Prakash Vyas:

Maximum spanning tree based redundancy elimination for feature selection of high dimensional data. 831-841 - Amouda Venkatesan, Buvaneswari Shanmugham:

Auto-poietic algorithm for multiple sequence alignment. 842-849 - Behzad Nobariyan, Nasrin Amini, Sabalan Daneshvar, Ataollah Abbasi:

A novel architectureof medical image fusion based on YCbCr-DWT transform. 850-856 - Aman Jatain, Deepti Gaur:

Reverse engineering of object oriented system using hierarchical clustering. 857-865 - Purwanto, Chikkannan Eswaran:

Enhanced hybrid prediction models for time series prediction. 866-874 - Shuliang Sun:

Image steganography based on hamming code and edge detection. 875-880 - Ayman Al-Dmour, Ibrahim El Rube, Laiali Almazaydeh:

A new method for curvilinear text line extraction and straightening of arabic handwritten text. 881-888 - Namiq Abdullah:

Transfer-based arabic to english noun sentence translation using shallow segmentation. 889-893 - Shinu John, M. A. Maluk Mohamed:

A network performance aware QoS based workflow scheduling for grid services. 894-903 - Saravana Veligandan, Naganathan Rengasari:

Hyperspectral image segmentation based on enhanced estimation of centroid with fast k-means. 904-911 - Pradeep Singh, Shrish Verma:

Multi-classifier model for software fault prediction. 912-919 - Mohammed Akour, Ahmad A. Saifan, Osama Ratha'an:

Traceability between code and design documentation in database management system: a case study. 920-926 - Meena Ramasamy, Ramapackiam Shantha Selva Kumari:

Edge preserving image segmentation using spatially constrained EM algorithm. 927-933 - Sofien Gannouni, Ameur Touir, Hassan Mathkour:

Paradigma: a distributed framework for parallel programming. 934-943
Volume 15, Number 6, November 2018
- Munish Kumar, Manish Kumar Jindal, Rajendra Kumar Sharma:

A novel handwriting grading system using gurmukhi characters. 945-950 - Amal Rochd, Maria Zrikem, Thierry Millan, Christian Percebois, Claude Baron:

Synchrostate: A SPEM-based solution for synchronizing activities and products through state transitions. 951-961 - Anitha Periasamy, Periasamy Pappampalayam:

Security mechanism against sybil attacks for high-throughput multicast routing in wireless mesh networks. 962-967 - Shima Afzali, Oktay Yildiz:

An effective sample preparation method for diabetes prediction. 968-973 - Mohammed Al-Kabi, Izzat Alsmadi, Rawan T. Khasawneh, Heider Wahsheh:

Evaluating social context in arabic opinion mining. 974-982 - Md. Al-Amin Bhuiyan, Abdul Raouf Khan:

Image quality assessment employing RMS contrast and histogram similarity. 983-989 - Adwan Yasin, Abdelmunem Abuhasan:

Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). 990-999 - Suma Gandhimathi, Kavitha Pillai:

Detection of neovascularization in proliferative diabetic retinopathy fundus images. 1000-1009 - Sohail Sarwar, Zia Ul-Qayyum, Abdul Kaleem:

Machine learning based intelligent framework for data preprocessing. 1010-1015 - Ruchika Malhotra, Megha Khanna:

An empirical study to evaluate the relationship of object-oriented metrics and change proneness. 1016-1023 - Shervan Fekri Ershad, Seyed Mostafa Fakhrahmad, Farshad Tajeripour:

Impulse noise reduction for texture images using real word spelling correction algorithm and local binary patterns. 1024-1030 - Ahsan Abdullah, Ahmad Bakhashwain, Abdullah Basuhail, Muhammad Ahtisham Aslam:

Using data mining for predicting cultivable uncultivated regions in the middle east. 1031-1042 - Chih-Hao Wen, Shu-Hsien Liao, Shufang Huang:

Mining consumer knowledge from shopping experience: TV shopping industry. 1043-1051 - Bin Zhang, Xingchun Diao, Yi Liu, Yun Yu, Donghong Qin:

A physical topology discovery method based on AFTs of down constraint. 1052-1059 - Rajalaxmi Ramasamy, Sylvia Rani:

Modified binary bat algorithm for feature selection in unsupervised learning. 1060-1067 - Xiaohui Tan, Mingquan Zhou, Yachun Fan, Xuesong Wang, Zhongke Wu:

Explicitly symplectic algorithm for long-time simulation of ultra-flexible cloth. 1068-1075 - Jayashree Pillai, Theagarajan Padma:

Semi fragile watermarking for content based image authentication and recovery in the DWT-DCT domains. 1076-1081 - Malika Ait Aider, Kamal Hammouche, Djamel Gaceb:

Recognition of handwritten characters based on wavelet transform and SVM classifier. 1082-1087 - Sujan Kumar Saha, Mukta Majumder:

Development of a hindi named entity recognition system without using manually annotated training corpus. 1088-1098 - Khalil M. El Hindi:

Combining instance weighting and fine tuning for training naïve bayesian classifiers with scanttrainingdata. 1099-1106

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














